These are on the -02 draft.  Sorry they took so long for me to type up
(I read it quite a while ago).  Sadly this also meant I'm trying to
understand my own notes ;-)

General comments:

   - overall I think it's an important document to have.  If people are
     going to do split views (and they will) then we should at least
     describe how to do it correctly.

   - I'd be tempted to list motivation for the document a bit better.
     IE, explicitly state "these are the goals of this document"

   - the problem with the solution, however, is easily noticed from the
     number of hosts in figure 1.  If it takes so many hosts it's
     unlikely people will be highly motivated to do split-view the way
     you're hoping they will.

   - I'd actually make a recommendation somewhere in the document with
     a bit more strength.  Yes, it outlines choices but I'd be really
     tempted to say what you should do instead of using split-views if
     you can (eg, use internal.example.com for internal data and thus
     it only exposes the existence of the internal NS record and
     nothing else if the name server can't be reached.  but if you're
     unwilling to do that, this document is for you).

section 1, 3rd paragraph:
   OLD:
     The security extensions to DNS...
   NEW:
     The security extensions to DNS (commonly labeled "DNSSEC")...
                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^

   OLD:
     configured at the end resolver to the signed record
   NEW:
     configured at the end validating resolver to the signed record
                         ^^^^^^^^^^

Section 2.1, 4th paragraph:
   Re:
      split-views is not recommended for hiding ... names can be leaked out.

   I suggest you explain how things are leaked (NSEC) rather than just
   say things are leaked.

last P of 2.1:
   you should state something like "The diagrams in the
   next section help document this architecture".

end of 2.1:
   also might be worth mentioning that some name servers
   don't provide decent configuration of view-boundaries and thus some of
   these solutions are likely only implementable on certain
   architectures.

section 2.2, second paragraph (at end):
   you should mention where the externally authoritative server needs
   to be located.

Figure 1:
   I think this diagram is functional, but it took me a bit of study to
   understand all the components of it.  I do wonder if we could make
   it more clear.  One of the biggest questions I had that wasn't
   intuitively clear is why there is a CLIENTS listed inbetween the
   inner and outer packet filters.  Possibly more of a block diagram
   might be helpful.

   Something like (this is not at all complete):

                        INTERNAL            DMZ                EXTERNAL
                        NETWORK            BOUNDARY            NETWORK
                                      |                    |
                   +---------------+  |                    |
                   | Internal      |  |                    |
                   | Authoritative |  |                    |
                   | Server        |  |                    |
                   +---------------+  |                    |
                     ^                |                    |
                     |                |                    |
                     |                |                    |
   +---------+     +---------------+  |  +--------+        |   +-------------+
   |         |     |   Internal    |  |  | Second |        |   |             |
   | Clients |     |   Recursive   |  |  | Level  |        |   | External    |
   |         |     |   Forwarder   |  |  | Name   |        |   | Nameservers |
   |         | --> |               |--|->| Server | -------|-->|             |
   +---------+     +---------------+  |  +--------+        |   +-------------+
                     |                |                    |
                     |                |                    |
                     |                |                    |
                     |                |  +---------------+ |
                     |                |  | External      | |
                     -----------------|->| Authoritative | |
                                      |  | Server        | |
                                      |  +---------------+ |
                                      |                    |


   I think that's just slightly more readable...  I could tinker with
   it more if you want to consider using it.

Section 2.3:
   Add a reference for TSIG

Section 2.4.1, 2.4.2:
   Implies TSIG is only used in one direction...  Needs to be used for
   both?  I'm not a TSIG expert (to say the least. Though I've used it
   I haven't studied the docs), but I'd think if you received a TSIG
   request you need to send the response protected as well?  Or is it
   independent (in which case, unidirectional is fine since you only
   care that the 2nd level server only handles requests from authorized
   hosts).

Section 3:
   OLD:
   Any data in any view that is likely to be spoofed has to be signed.

   NEW:
   Any data in any view that may be spoofed has to be signed.
                             ^^^

   (I didn't think the word "likely" is a good choice here.  You want
   to imply "important" and whether it's "possible" not the possibility
   of whether it's going to be spoofed or not)

Section 3.2, first sentence:
   OLD:
   the external zone data.

   NEW:
   the external zone data (does not include sub-domains).

Section 3.4:
   worth mentioning (last sentence) that the only data that can be
   polluted is data from the other zone...  I don't think it's clear
   that's what you're talking about to newer readers.

section 3.6:
   "All name servers listed below..."

   listed where?  I don't see a list...  I suspect this section is
   incomplete?


rule sections 4.1-4.2:
   I'd explicitly list the drop rules as well...  You're only listing
   the accept rules and I'd hate to see someone just put in the accept
   rules without the drop counterparts.

Section 4.1, clients in the boundary network:
   Might say that if there aren't any, you can just drop these?

section 5, paragraph 3:
   This is a fairly negative sounding paragraph...  I'd either say
   "don't do it unless absolutely possible" or "if you, these methods
   are the only way to avoid the pitfalls".

section 7: last sentence:
   this needs to be stated much earlier in the document as well.  This
   is what I kept expecting to see earlier but didn't.


--
Wes Hardaker
Sparta, Inc.
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to